Wiz Agents & Workflows are here

CVE-2020-12034
Rockwell Automation RSLinx Classic vulnerability analysis and mitigation

Overview

CVE-2020-12034 is a SQL injection vulnerability discovered in Rockwell Automation's EDS Subsystem Version 28.0.1 and prior, affecting multiple products including FactoryTalk Linx software (Versions 6.00, 6.10, and 6.11), RSLinx Classic (Version 4.11.00 and prior), RSNetWorx software (Version 28.00.00 and prior), and Studio 5000 Logix Designer software (Version 32 and prior). The vulnerability was disclosed on May 19, 2020 (NIST NVD).

Technical details

The vulnerability stems from inadequate input sanitization in the EDS subsystem, which could allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. The vulnerability has been assigned a CVSS v3.1 base score of 8.2 (HIGH) with the vector string AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H, indicating it can be exploited from an adjacent network with low attack complexity and requires no privileges or user interaction (CISA Advisory).

Impact

Successful exploitation of this vulnerability could lead to denial-of-service (DoS) conditions or allow an attacker to manipulate the SQL engine to write or modify files on the system. The vulnerability affects critical infrastructure sectors including Critical Manufacturing, Energy, and Water and Wastewater Systems worldwide (CISA Advisory).

Mitigation and workarounds

Rockwell Automation has released patches and recommends applying them by following the instructions in knowledgebase article RAid 1125928. Additional mitigations include blocking all traffic to EtherNet/IP or other CIP protocol-based devices from outside the manufacturing zone by restricting access to TCP Ports 2222, 7153 and UDP Port 44818 using proper network infrastructure controls. Organizations should also locate control system networks behind firewalls and isolate them from the business network (CISA Advisory).

Community reactions

The vulnerability was discovered and reported by Sharon Brizinov and Amir Preminger of Claroty to Rockwell Automation and CISA (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Rockwell Automation RSLinx Classic vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2020-12001CRITICAL9.8
  • Rockwell Automation RSLinx ClassicRockwell Automation RSLinx Classic
  • cpe:2.3:a:rockwellautomation:factorytalk_linx
NoYesJun 15, 2020
CVE-2020-11999HIGH8.1
  • Rockwell Automation RSLinx ClassicRockwell Automation RSLinx Classic
  • cpe:2.3:a:rockwellautomation:rslinx_classic
NoYesJun 15, 2020
CVE-2020-13573HIGH7.5
  • Rockwell Automation RSLinx ClassicRockwell Automation RSLinx Classic
  • cpe:2.3:a:rockwellautomation:rslinx
NoYesJan 07, 2021
CVE-2020-12005HIGH7.5
  • Rockwell Automation RSLinx ClassicRockwell Automation RSLinx Classic
  • cpe:2.3:a:rockwellautomation:factorytalk_linx
NoYesJun 15, 2020
CVE-2020-12003HIGH7.5
  • Rockwell Automation RSLinx ClassicRockwell Automation RSLinx Classic
  • cpe:2.3:a:rockwellautomation:factorytalk_linx
NoYesJun 15, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management